{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:49Z","timestamp":1772164009376,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,1,11]],"date-time":"2016-01-11T00:00:00Z","timestamp":1452470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,1,11]]},"DOI":"10.1145\/2837614.2837674","type":"proceedings-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T09:05:00Z","timestamp":1452157500000},"page":"313-326","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Estimating types in binaries using predictive modeling"],"prefix":"10.1145","author":[{"given":"Omer","family":"Katz","sequence":"first","affiliation":[{"name":"Technion, Israel"}]},{"given":"Ran","family":"El-Yaniv","sequence":"additional","affiliation":[{"name":"Technion, Israel"}]},{"given":"Eran","family":"Yahav","sequence":"additional","affiliation":[{"name":"Technion, Israel"}]}],"member":"320","published-online":{"date-parts":[[2016,1,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Hex-rays interactive disassembler (ida) pro. https:\/\/www. hex-rays.com\/products\/ida\/.  Hex-rays interactive disassembler (ida) pro. https:\/\/www. hex-rays.com\/products\/ida\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Microsoft corporation. visual studio. https:\/\/www.visualstudio. com.  Microsoft corporation. visual studio. https:\/\/www.visualstudio. com."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007588710878"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236371"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"B \n      \n      ALAKRISHNAN G. AND R \n      EPS T.\n \n  \n  Divine: Discovering variables in executables\n  . In Verification Model Checking and Abstract Interpretation B. Cook and A. Podelski Eds. vol. \n  4349\n   of \n  Lecture Notes in Computer Science\n  . \n  Springer 2007 pp. 1\u2013\n  28\n  .   B ALAKRISHNAN G. AND R EPS T. Divine: Discovering variables in executables. In Verification Model Checking and Abstract Interpretation B. Cook and A. Podelski Eds. vol. 4349 of Lecture Notes in Computer Science. Springer 2007 pp. 1\u201328.","DOI":"10.1007\/978-3-540-69738-1_1"},{"key":"e_1_3_2_1_6_1","first-page":"140","volume-title":"Proceedings of the Theory and Practice of Software, 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems","author":"ALAKRISHNAN G.","year":"2008"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749612"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217943"},{"key":"e_1_3_2_1_9_1","first-page":"860","volume-title":"USENIX Association","author":"AO T."},{"key":"e_1_3_2_1_10_1","first-page":"379","article-title":"Superior guarantees for sequential prediction and lossless compression via alphabet decomposition","volume":"7","author":"EGLEITER R.","year":"2006","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Variations on probabilistic suffix trees: statistical modeling and prediction of protein families","volume":"17","author":"EJERANO G.","year":"2001","journal-title":"Bioinformatics"},{"key":"e_1_3_2_1_12_1","first-page":"189","volume-title":"IEEE Computer Society","author":"ERGERON J."},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer Science","first-page":"469","volume-title":"Computer Aided Verification","author":"RUMLEY D.","year":"2011"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3115\/981863.981904"},{"key":"e_1_3_2_1_15_1","first-page":"4","article-title":"Data compression using adaptive coding and partial string matching. Communications","volume":"32","author":"LEARY J. G.","year":"1984","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.07.010"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594343"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268948"},{"key":"e_1_3_2_1_19_1","first-page":"1424","volume-title":"Advances in neural information processing systems","author":"SKIN E.","year":"2002"},{"key":"e_1_3_2_1_20_1","series-title":"Lecture Notes in Computer Science","first-page":"267","volume-title":"Automated Deduction - CADE","author":"REDRIKSON M.","year":"2011"},{"key":"e_1_3_2_1_21_1","first-page":"155","volume-title":"Software Engineering (ICSE), 2015 IEEE\/ACM 37th IEEE International Conference on (May","volume":"1","author":"OPAN D.","year":"2015"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.27"},{"key":"e_1_3_2_1_23_1","first-page":"41","volume-title":"Reverse Engineering (WCRE), 2013 20th Working Conference on (Oct","author":"ALLER I.","year":"2013"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.71"},{"key":"e_1_3_2_1_25_1","unstructured":"J AAKKOLA T. H AUSSLER D. ET AL. Exploiting generative models in discriminative classifiers. Advances in neural information processing systems (1999) 487\u2013493.   J AAKKOLA T. H AUSSLER D. ET AL. Exploiting generative models in discriminative classifiers. Advances in neural information processing systems (1999) 487\u2013493."},{"key":"e_1_3_2_1_26_1","volume-title":"Network and Distributed System Security (NDSS) Symposium","author":"ANG D.","year":"2014"},{"key":"e_1_3_2_1_27_1","volume-title":"Computer Security Foundations Workshop, IEEE 0","author":"HA S.","year":"2001"},{"key":"e_1_3_2_1_28_1","first-page":"3","article-title":"Estimation of probabilities from sparse data for the language model component of a speech recognizer. Acoustics, Speech and Signal Processing","volume":"35","author":"ATZ S. M","year":"1987","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056331"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2011","author":"EE J.","year":"2011"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.61115"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1162\/153244302760200687"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491417"},{"key":"e_1_3_2_1_34_1","unstructured":"M AHONEY M. V. Adaptive weighing of context models for lossless data compression 2005.  M AHONEY M. V. Adaptive weighing of context models for lossless data compression 2005."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.04.006"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384689"},{"key":"e_1_3_2_1_37_1","first-page":"11","article-title":"Implementing the ppm data compression scheme. Communications","volume":"38","author":"OFFAT A","year":"1990","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_38_1","first-page":"374","volume-title":"Knowledge Discovery in Databases: PKDD","author":"ISENSON M.","year":"2003"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02518-1_11"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190270"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292553"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594321"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"R \n      \n      EPS T. AND B ALAKRIS\n      HNAN G.\n\n  \n   \n  Improved memory-access analysis for x86 executables\n  . In Compiler Construction L. Hendren Ed. vol. \n  4959\n   of \n  Lecture Notes in Computer Science\n  . \n  Springer 2008 pp. 16\u2013\n  35\n  .   R EPS T. AND B ALAKRISHNAN G. Improved memory-access analysis for x86 executables. In Compiler Construction L. Hendren Ed. vol. 4959 of Lecture Notes in Computer Science. Springer 2008 pp. 16\u201335.","DOI":"10.1007\/978-3-540-78791-4_2"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111542.1111560"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"R \n      \n      EPS T. B \n      \n      \n      ALAKRISHNAN G. L \n      \n      \n      IM J. AND T EITEL\n      BAUM T.\n\n  \n   \n  A next-generation platform for analyzing executables\n  . In Malware Detection M. Christodorescu S. Jha D. Maughan D. Song and C. Wang Eds. vol. \n  27\n   of \n  Advances in Information Security\n  . \n  Springer US 2007 pp. 43\u2013\n  61\n  .  R EPS T. B ALAKRISHNAN G. L IM J. AND T EITELBAUM T. A next-generation platform for analyzing executables. In Malware Detection M. Christodorescu S. Jha D. Maughan D. Song and C. Wang Eds. vol. 27 of Advances in Information Security. Springer US 2007 pp. 43\u201361.","DOI":"10.1007\/978-0-387-44599-1_3"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_6"},{"key":"e_1_3_2_1_48_1","first-page":"1278","volume-title":"Proceedings of the IEEE","volume":"88","author":"OSENFELD R.","year":"2000"},{"key":"e_1_3_2_1_49_1","unstructured":"S ABANAL P. V. AND Y ASON M. V. Reversing C++. https:\/\/www.blackhat.com\/presentations\/bh-dc-07\/ Sabanal_Yason\/Paper\/bh-dc-07-Sabanal_Yason-WP.pdf.  S ABANAL P. V. AND Y ASON M. V. Reversing C++. https:\/\/www.blackhat.com\/presentations\/bh-dc-07\/ Sabanal_Yason\/Paper\/bh-dc-07-Sabanal_Yason-WP.pdf."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth141"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.3115\/981732.981757"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"CHWARTZ E. J.","year":"2013"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237727"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000013"},{"key":"e_1_3_2_1_55_1","unstructured":"T U S. MINO: Data-driven type inference for python. MIT 6.867 Fall 2012 Final Project December 2012.  T U S. MINO: Data-driven type inference for python. MIT 6.867 Fall 2012 Final Project December 2012."}],"event":{"name":"POPL '16: The 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","location":"St. Petersburg FL USA","acronym":"POPL '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837614.2837674","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2837614.2837674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:43:38Z","timestamp":1750211018000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837614.2837674"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,11]]},"references-count":55,"alternative-id":["10.1145\/2837614.2837674","10.1145\/2837614"],"URL":"https:\/\/doi.org\/10.1145\/2837614.2837674","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2914770.2837674","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,1,11]]},"assertion":[{"value":"2016-01-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}